Blog Posts Tagged with "Platform"


A Day Without COBOL: The Crucial Role it Plays

August 21, 2012 Added by:Bill Gerneglia

Those who have labeled COBOL ‘a dying language’ should reconsider. With COBOL supporting the majority of the world’s businesses, it is impossible to dispute its viability in the enterprise. It remains a cornerstone of business-critical applications and has successfully navigated through each computing generation...

Comments  (0)


The Patchwork Cloud Part 1: An Overview

February 23, 2012 Added by:Rafal Los

Cloud computing isn't a paradigm every organization will follow whole-hog, nor should it be. Public cloud, hybrid cloud, private cloud, these are all terms need to be understood first and have some sort of rational approaches to security and risk management around them...

Comments  (0)


Master the Cloud, Montréal - Notes from the Road Part 2

February 01, 2012 Added by:Rafal Los

As clouds pop up, expand and workloads become mobile across virtualization platforms, federation will allow a much easier move from one provider and from one platform to another without having to worry about separate authentication, authorization, and validation efforts...

Comments  (0)


Parallelized Data Mining Security

April 12, 2011 Added by:K S Abhiraj

Problems with protecting hosts from malicious code are understood. The problem posed by malicious hosts to entities and the environment is more complex. Since an entity is under the control of the executing host, the host can in principle do anything to the event and its code...

Comments  (2)


Predictive Analysis in the Cloud Infrastructure

November 26, 2010 Added by:Ben Kepes

What happens when you take the sort of predictive analytics that are more commonly used for predicting election outcomes and stock market movement and apply them to cloud infrastructure?

Comments  (0)


Hacking Virtual Machines Part 2 - Virtualization Environments

November 21, 2010 Added by:Bozidar Spirovski

Virtualization is considered to be the new renaissance in computing. Suddenly, all those over sized servers are put to great use by putting multiple Guest OS's on them. But running IT services in a virtualized environment brings a whole host of new opportunities for hackers...

Comments  (1)